Although the perpetrators of the San Bernardino mass shooting were killed in a gun battle with law enforcement within hours of the attack, the FBI’s interest in one terrorist’s iPhone precipitated a public standoff with Apple that...

Like NAC, software-defined perimeter (SDP) is a bit of a niche today. But cloud, IoT and mobility will likely drive massive SDP proliferation over the next few years.

As security leaders, we want to allow your teams to move as fast as possible and not deploy a policy or technology because someone touts it as the best way to do something. CRM vendor Conga provides these tips for that healthy balance....

The Internet of things (IoT) has already been used to launch the biggest DDoS attacks ever, but now it represents a potential path for attackers to compromise cell phones.

The Center for Internet Security (CIS) benchmark for macOS is widely regarded as a comprehensive checklist for organizations to follow to secure their Macs. This white paper from JAMF Software-the Apple Management Experts-will show

Wombat Security Technologies recommends remote employees follow these 10 best practices to shore up security for their organizations — and themselves.

For most of us, pagers went out when cell phones came in, but some companies are still using them and when the messages sent without encryption, attackers can listen in and even interfere with the communications

ProtectWise provides visibility into otherwise unseen devices. The company uses the ProtectWise solution to get unmanaged personally owned devices under control.

Russian cybercriminals have field tested their attack techniques on local banks, and have now begun taking them global, according to a new report -- and a new breed of mobile attack apps is coming up next.

A backdoor in Android firmware provided by manufacturer Foxconn allows attackers to root devices to which they have physical access, according to a security researcher and BBQ enthusiast who dubbed the vulnerability Pork Explosion.

Small and medium sized businesses have embraced BYOD faster than large corporations, but research suggests SMBs aren't taking security seriously. Here are five affordable and easy-to-deploy BYOD management solutions that will get your...

Redstone 2 has been delayed until Spring 2017, but the most recent Microsoft operating system update, Redstone 1, also dubbed the Windows 10 Anniversary Update 1607, brings plenty of enterprise IT updates – including these seven EMM...

See how analytics can amplify alert prioritization and incident investigation skills of security analyst teams, allowing them to efficiently prioritize alerts from other systems, and easily investigate and triage incidents through